If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Metasploit msfpayload | using an existing executable?

Hello,

I'm trying to bind two executables with msfpayload and the msfencode features. However, I'm not sure that msfpayload will accept a preexisting executable instead of an input like 'windows/meterpreter/reverse_tcp'.

Re: Metasploit msfpayload | using an existing executable?

That's too bad..

It would be a quick fix for what I need. I'm basically trying to bind two executables together while retaining the icon and 'Version' info of the original executable. I figured AVs would not scream bloody murder if I used something other than the widely available exe binders without having to purchase unique stubs...

Re: Metasploit msfpayload | using an existing executable?

Thanks for the info, those links increased the size of my brain.

Since my original idea is not feasible, I've opted to go with the windows/exec payload(or maybe download_exec). I wasn't aware of the -k option. That effectively allows me to change strategy. My situation seems to be resolved...